{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:50:28Z","timestamp":1747227028800,"version":"3.33.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T00:00:00Z","timestamp":1730851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T00:00:00Z","timestamp":1730851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,6]]},"DOI":"10.1109\/ithet61869.2024.10837641","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:35:30Z","timestamp":1737052530000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Probabilistic Machine Learning for Simulating Complex Learner Profiles"],"prefix":"10.1109","author":[{"given":"Vamsi Krishna","family":"Nadimpalli","sequence":"first","affiliation":[{"name":"Laboratory for Safe and Secure Systems (LaS),Faculty of Electrical Engineering and Information Technology,Regensburg,Germany,93053"}]},{"given":"Flemming","family":"Bugert","sequence":"additional","affiliation":[{"name":"Laboratory for Safe and Secure Systems (LaS),Faculty of Electrical Engineering and Information Technology,Regensburg,Germany,93053"}]},{"given":"Dominik","family":"Bittner","sequence":"additional","affiliation":[{"name":"Laboratory for Safe and Secure Systems (LaS),Faculty of Electrical Engineering and Information Technology,Regensburg,Germany,93053"}]},{"given":"Susanne","family":"Staufer","sequence":"additional","affiliation":[{"name":"Laboratory for Safe and Secure Systems (LaS),Faculty of Electrical Engineering and Information Technology,Regensburg,Germany,93053"}]},{"given":"Simon","family":"R\u00f6hrl","sequence":"additional","affiliation":[{"name":"Laboratory for Safe and Secure Systems (LaS),Faculty of Electrical Engineering and Information Technology,Regensburg,Germany,93053"}]},{"given":"Florian","family":"Hauser","sequence":"additional","affiliation":[{"name":"Laboratory for Safe and Secure Systems (LaS),Faculty of Electrical Engineering and Information Technology,Regensburg,Germany,93053"}]},{"given":"Timur","family":"Ezer","sequence":"additional","affiliation":[{"name":"Laboratory for Safe and Secure Systems (LaS),Faculty of Electrical Engineering and Information Technology,Regensburg,Germany,93053"}]},{"given":"Lisa","family":"Grabinger","sequence":"additional","affiliation":[{"name":"Laboratory for Safe and Secure Systems (LaS),Faculty of Electrical Engineering and Information Technology,Regensburg,Germany,93053"}]},{"given":"Robert","family":"Maier","sequence":"additional","affiliation":[{"name":"Laboratory for Safe and Secure Systems (LaS),Faculty of Electrical Engineering and Information Technology,Regensburg,Germany,93053"}]},{"given":"J\u00fcrgen","family":"Mottok","sequence":"additional","affiliation":[{"name":"Laboratory for Safe and Secure Systems (LaS),Faculty of Electrical Engineering and Information Technology,Regensburg,Germany,93053"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3593663.3593681"},{"key":"ref2","article-title":"Synthetic data-what, why and how?","author":"Jordon","year":"2022","journal-title":"arXiv preprint"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006475"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.59453\/\/KHZW9006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16290-9_29"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1006\/csla.1999.0123"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3548785.3548793"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/math10152733"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3156073"},{"journal-title":"Generating synthetic data through hidden markov models","year":"2018","author":"Huertas","key":"ref10"},{"key":"ref11","article-title":"Comparing synthetic tabular data generation between a probabilistic model and a deep learning model for education use cases","author":"Combrink","year":"2022","journal-title":"arXiv preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8285168"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/RAISE.2019.00012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.31390\/gradschool_dissertations.4601"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.isci.2022.105331"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SMC52423.2021.9658967"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI50628.2021.9597364"},{"journal-title":"Generating synthetic multispectral images for semantic segmentation in forestry applications","year":"2022","author":"Bittner","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65965-3_3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s40593-023-00337-2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-7b98e3ed-001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0925-1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1311138"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2307\/2332226"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/33.3.239"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2996543"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IAEAC.2017.8054419"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K19-1026"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/2982217"},{"volume-title":"Probabilistic graphical models: principles and techniques","year":"2009","author":"Koller","key":"ref30"},{"key":"ref31","article-title":"Markov chains","volume":"650","author":"Ching","year":"2006","journal-title":"Models, algorithms and applications"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1037\/t43782-000"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1027\/1015-5759.23.3.193"},{"key":"ref34","article-title":"Kurz und knapp die kurzskala des fragebogens \u201clern-strategien im studium \u201c(list)","author":"Klingsieck","year":"2019","journal-title":"Zeitschrift f\u00fc r p\u00e4 dagogische Psychologie"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.21125\/iceri.2023.1144"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054142"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-370477-1.x5016-6"},{"issue":"7","key":"ref38","first-page":"674","article-title":"Learning and teaching styles in engineering education","volume":"78","author":"Felder","year":"1988","journal-title":"Engineering education"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.21125\/iceri.2023.0815"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.solener.2014.02.026"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.orhc.2019.04.001"}],"event":{"name":"2024 21st International Conference on Information Technology Based Higher Education and Training (ITHET)","start":{"date-parts":[[2024,11,6]]},"location":"Paris, France","end":{"date-parts":[[2024,11,8]]}},"container-title":["2024 21st International Conference on Information Technology Based Higher Education and Training (ITHET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10837011\/10837012\/10837641.pdf?arnumber=10837641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T07:52:47Z","timestamp":1737100367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10837641\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,6]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/ithet61869.2024.10837641","relation":{},"subject":[],"published":{"date-parts":[[2024,11,6]]}}}